Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

Author: Axel Buecker

Publisher: IBM Redbooks

Published: 2015-11-02

Total Pages: 200

ISBN-13: 0738441023

DOWNLOAD EBOOK

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.


Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

Author: Axel Buecker

Publisher: IBM Redbooks

Published: 2014-02-06

Total Pages: 240

ISBN-13: 0738437891

DOWNLOAD EBOOK

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever. This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external regulations. This book shows how these drivers can be translated into capabilities and security needs that can be represented in frameworks, such as the IBM Security Blueprint, to better enable enterprise security. To help organizations with their security challenges, IBM created a bridge to address the communication gap between the business and technical perspectives of security to enable simplification of thought and process. The IBM Security Framework can help you translate the business view, and the IBM Security Blueprint describes the technology landscape view. Together, they can help bring together the experiences that we gained from working with many clients to build a comprehensive view of security capabilities and needs. This book is intended to be a valuable resource for business leaders, security officers, and consultants who want to understand and implement enterprise security by considering a set of core security capabilities and services.


Building Real-time Mobile Solutions with MQTT and IBM MessageSight

Building Real-time Mobile Solutions with MQTT and IBM MessageSight

Author: Bryan Boyd

Publisher: IBM Redbooks

Published: 2014-12-05

Total Pages: 268

ISBN-13: 0738440051

DOWNLOAD EBOOK

MQTT is a messaging protocol designed for the Internet of Things (IoT). It is lightweight enough to be supported by the smallest devices, yet robust enough to ensure that important messages get to their destinations every time. With MQTT devices, such as energy meters, cars, trains, mobile phones and tablets, and personal health care devices, devices can communicate with each other and with other systems or applications. IBM® MessageSight is a messaging appliance designed to handle the scale and security of a robust IoT solution. MessageSight allows you to easily secure connections, configure policies for messaging, and scale to up to a million concurrently connected devices. This IBM Redbooks® publication introduces MQTT and MessageSight through a simple key fob remote MQTT application. It then dives into the architecture and development of a robust, cross-platform Ride Share and Taxi solution (PickMeUp) with real-time voice, GPS location sharing, and chat among a variety of mobile platforms. The publication also includes an addendum describing use cases in a variety of other domains, with sample messaging topology and suggestions for design.


IBM Tivoli Storage Manager as a Data Protection Solution

IBM Tivoli Storage Manager as a Data Protection Solution

Author: Larry Coyne

Publisher: IBM Redbooks

Published: 2014-08-15

Total Pages: 354

ISBN-13: 0738439983

DOWNLOAD EBOOK

When you hear IBM® Tivoli® Storage Manager, the first thing that you typically think of is data backup. Tivoli Storage Manager is the premier storage management solution for mixed platform environments. Businesses face a tidal wave of information and data that seems to increase daily. The ability to successfully and efficiently manage information and data has become imperative. The Tivoli Storage Manager family of products helps businesses successfully gain better control and efficiently manage the information tidal wave through significant enhancements in multiple facets of data protection. Tivoli Storage Manager is a highly scalable and available data protection solution. It takes data protection scalability to the next level with a relational database, which is based on IBM DB2® technology. Greater availability is delivered through enhancements such as online, automated database reorganization. This IBM Redbooks® publication describes the evolving set of data-protection challenges and how capabilities in Tivoli Storage Manager can best be used to address those challenges. This book is more than merely a description of new and changed functions in Tivoli Storage Manager; it is a guide to use for your overall data protection solution.


Feedback Systems

Feedback Systems

Author: Karl Johan Åström

Publisher: Princeton University Press

Published: 2021-02-02

Total Pages:

ISBN-13: 069121347X

DOWNLOAD EBOOK

The essential introduction to the principles and applications of feedback systems—now fully revised and expanded This textbook covers the mathematics needed to model, analyze, and design feedback systems. Now more user-friendly than ever, this revised and expanded edition of Feedback Systems is a one-volume resource for students and researchers in mathematics and engineering. It has applications across a range of disciplines that utilize feedback in physical, biological, information, and economic systems. Karl Åström and Richard Murray use techniques from physics, computer science, and operations research to introduce control-oriented modeling. They begin with state space tools for analysis and design, including stability of solutions, Lyapunov functions, reachability, state feedback observability, and estimators. The matrix exponential plays a central role in the analysis of linear control systems, allowing a concise development of many of the key concepts for this class of models. Åström and Murray then develop and explain tools in the frequency domain, including transfer functions, Nyquist analysis, PID control, frequency domain design, and robustness. Features a new chapter on design principles and tools, illustrating the types of problems that can be solved using feedback Includes a new chapter on fundamental limits and new material on the Routh-Hurwitz criterion and root locus plots Provides exercises at the end of every chapter Comes with an electronic solutions manual An ideal textbook for undergraduate and graduate students Indispensable for researchers seeking a self-contained resource on control theory


Principles of Management

Principles of Management

Author: David S. Bright

Publisher:

Published: 2023-05-16

Total Pages: 0

ISBN-13: 9781998109166

DOWNLOAD EBOOK

Black & white print. Principles of Management is designed to meet the scope and sequence requirements of the introductory course on management. This is a traditional approach to management using the leading, planning, organizing, and controlling approach. Management is a broad business discipline, and the Principles of Management course covers many management areas such as human resource management and strategic management, as well as behavioral areas such as motivation. No one individual can be an expert in all areas of management, so an additional benefit of this text is that specialists in a variety of areas have authored individual chapters.


IBM System Storage DS8700 Architecture and Implementation

IBM System Storage DS8700 Architecture and Implementation

Author: Bertrand Dufrasne

Publisher: IBM Redbooks

Published: 2011-02-12

Total Pages: 630

ISBN-13: 0738434620

DOWNLOAD EBOOK

This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM System Storage® DS8700 storage subsystem. This book has reference information that will help you plan for, install, and configure the DS8700 and also discusses the architecture and components. The DS8700 is the most advanced model in the IBM System Storage DS8000® series. It includes IBM POWER6®-based controllers, with a dual 2-way or dual 4-way processor complex implementation. Its extended connectivity, with up to 128 Fibre Channel/FICON® ports for host connections, make it suitable for multiple server environments in both open systems and IBM System z® environments. If desired, the DS8700 can be integrated in an LDAP infrastructure. The DS8700 supports thin provisioning. Depending on your specific needs, the DS8700 storage subsystem can be equipped with SATA drives, FC drives, and Solid® State Drives (SSDs). The DS8700 can now automatically optimize the use of SSD drives through its no charge Easy Tier feature. The DS8700 also supports Full Disk Encryption (FDE) feature. Its switched Fibre Channel architecture, dual processor complex implementation, high availability design, and the advanced Point-in-Time Copy and Remote Mirror and Copy functions that incorporates make the DS8700 storage subsystem suitable for mission-critical business functions.


Smarter Data Centers: Achieving Greater Efficiency

Smarter Data Centers: Achieving Greater Efficiency

Author: Mike Ebbers

Publisher: IBM Redbooks

Published: 2011-10-21

Total Pages: 138

ISBN-13: 073845012X

DOWNLOAD EBOOK

As we move towards becoming a smarter planet and the world becomes more instrumented, interconnected, and intelligent, the demands for data center resources are increasing rapidly. Smaller and more densely packed servers providing greater amounts of computing power can substantially increase power and cooling needs, while growing data volumes necessitate larger storage and network bandwidth capacities. Environmental and regulatory requirements can introduce additional limits on carbon emissions and water consumption. To satisfy these demands while keeping costs in check, our data centers need to be smarter as well. Comprehensive views of data center inventories, operational and environmental conditions, and consumption across multiple capacity types that span both facilities and IT are required. You can achieve greater efficiency using hardware, software, services, and design both in facilities and IT, but you need a comprehensive data center strategy to tie them together and thus obtain a complete picture of your data center environments. This IBM® RedpaperTM publication discusses important considerations when creating and implementing your smarter data center strategy. Notable techniques, best practices, and technological advances that can become critical components of success are included, along with methods for bringing them together to gain in-depth knowledge of data center operations. With such insight comes increased resiliency, rapid responsiveness, profitable access to detailed analytics, and reliable planning for the future. Although not all-inclusive, this document provides a guide to getting started, points you to additional sources of information, and suggests ways IBM can partner with you in your pursuit of a smarter data center.